Monday, January 30, 2017

Tips on where to start in managing risk

How to keep branch offices as secure as corporate HQ

Email not displaying correctly? View it in your browser.

CSO

CSO Continuity & Recovery

Jan 30, 2017
Featured Image

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good enough. Caroline Wong, vice president of security strategy at Cobalt, provides a few tips for managing risk in today's modern business environment. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to keep branch offices as secure as corporate HQ
Is antivirus getting worse?
When real-time threat detection is essential
The essential guide to anti-malware tools
6 tips to protect your home network
8 data storage and recovery tips

Video/Webcast: Neustar Inc

2016: A Security Minefield - Will You Be Ready for 2017?

Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More

Thumbnail Image

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions. Read More

Thumbnail Image

Is antivirus getting worse?

Anti-virus software is getting worse at detecting both known and new threats, says a new report. Average detection rates for known malware went down a couple of percentage points slightly from 2015 to 2016, while detection rates for zero-days dropped in a big way. Read More

Thumbnail Image

When real-time threat detection is essential

There are times when an organization will be especially vulnerable if they don't have real-time detection capabilities, and in preparation for these events it's a good idea to reevaluate tools and strategies. Mike Paquette, director of products, Security Market at Elastic, identifies some of the most common events that can leave an organization vulnerable, and offers advice to successfully navigating them. Read More

Thumbnail Image
INSIDER

The essential guide to anti-malware tools

Admins can choose from a bevy of secondary scanners and specialized tools to clean up infected or infested PCs. Read More

Thumbnail Image

6 tips to protect your home network

Remote workers who use their home office as their primary office are arguably at even more of a risk since they may be exposing corporate assets as well as personal assets. Untangle recommends the following best practices to secure your home network. Read More

Thumbnail Image
INSIDER

8 data storage and recovery tips

Data storage experts share their advice regarding the best ways for small and midsized businesses to protect electronic information. Read More

White Paper: Neustar Inc

Cybersecurity Essentials for 2017

For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn't take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. Read More

Top 5 Stories

1. Your favourite VPN app is harvesting your personal information
2. Breach notification website LeakedSource allegedly raided
3. That online job candidate may be carrying a virus
4. IRS to delay tax refunds as a security precaution
5. 10 scary things the TSA found on your fellow travelers

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Continuity & Recovery as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive